Firefly protects machine identities in cloud-native workloads

Firefly protects machine identities in cloud-native workloads

Share post

Venafi, the inventor and leader in machine identity management, introduces Firefly. The solution supports highly distributed cloud-native environments. As part of Venafi's machine identity control plan, it enables easy and secure implementation of developer-driven machine identity management requirements for cloud-native workloads.

Machine identities such as TLS and SPIFFE are deployed locally and at high speed in any environment. By adding speed, reliability, and security to machine identities in modern environments, organizations can ensure trust in issued certificates and compliance with corporate security policies while driving application development and digital transformation.

Machine identities in modern application areas

“With the increasing number of enterprises migrating to modern, cloud-native, and highly distributed structures, the demand for machine identities in modern use cases that need to be delivered at scale and with near-zero latency to meet key requirements increases to fulfill the authentication,” says Shivajee Samdarshi, chief product officer at Venafi. “Firefly addresses these critical challenges in a fast, simple, and secure manner. It reduces security risks while avoiding inefficiencies that often bog down development teams, and future-proofs organizations for the challenges of tomorrow.”

Easy to implement container

Firefly is delivered as an easy-to-deploy container that runs in any cloud-native environment, providing a fast, simple, and secure way to issue machine identities. The identity policies for machines are set in the Venafi Control Plane and propagated to the Firefly instances. Together, Venafi Control Plane and Firefly provide a lightweight, distributed structure. It provides high-speed, local, autonomous output that cloud-native, low-latency use cases and advanced CI/CD require with an identity provider embedded in the pipeline.

Key features include:

  • observability - By the Venafi control tarpaulin Firefly provides visibility into distributed output activity. This extends control plane observability of machine identities from the data center to the cloud and edge.
  • consistency - Firefly gives security teams control over machine identity policies issued to modern applications in cloud native environments, ensuring developers are using a secure and consistent issuer.
  • Reliability – Firefly requires little production deployment infrastructure to achieve high availability and fault tolerance.
  • Freedom of choice - Firefly offers multiple deployment options including cloud native, DevOps, cloud and federated PKI environments, giving developers the flexibility to deploy Firefly wherever and whenever needed.

“At Diebold Nixdorf, moving from legacy applications to cloud-native is a priority for us. We must give developers and platform teams a way to issue and provide machine identities, the solution must be lightweight, work on all cloud platforms. In addition, it must be fast and easy to implement,” says Scott Barronton, CISO at Diebold Nixdorf. “Venafi Firefly meets these requirements. It also provides security teams with visibility and policy control over machine identities. It combines the best of both worlds – we can work as fast as we need to and in a safe way.”

Additional information:

More at Venafi.com

 


About Venafi

Venafi is the leader in cybersecurity for machine identity management. From the foundation to the cloud, Venafi solutions manage and protect identities for all types of machines - from physical and IoT devices to software applications, APIs and containers. Venafi provides global visibility, lifecycle automation, and actionable intelligence for all types of machine identities and their associated security and reliability risks.


 

Matching articles on the topic

Risk: High API growth without sufficient IT security 

A study shows that nine out of ten decision makers know that APIs are a Trojan horse for cyberattacks - but the ➡ Read more

Major hack at Dropbox Sign

Sign, the Dropbox service for legally binding electronic signatures on contracts and the like, must report a cyberattack. E-mail addresses, user names, ➡ Read more

Cybersecurity through anomaly threat detection

Claroty's Medigate platform receives an important expansion with the Advanced Anomaly Threat Detection (ATD) module for anomaly threat detection. Obtained thereby ➡ Read more

LockBit is back: cyber attack on KJF with 17 clinics and schools 

The KJF - the headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. suffered an extensive cyber attack. The hackers around ➡ Read more

EU cybersecurity certification

With the “European Cybersecurity Scheme on Common Criteria” (EUCC), there is now a first systematic approach to certifying cybersecurity. ➡ Read more

Encrypt sensitive Microsoft 365 data

For public sector entities and systemically important utilities that fall under KRITIS guidelines, the rules for data security are repeated ➡ Read more

DORA in response to cyber attacks in the financial sector

The number of cyber attacks on the financial sector is increasing worldwide, and according to financial regulators, cyber attacks are also occurring in Germany ➡ Read more

Fatal: Managing directors consider awareness training to be unnecessary

A representative survey shows that almost half of German management consider important security awareness training to be unnecessary. This evaluation reveals ➡ Read more